eCourses are individual online courses from renowned presenters at our live conferences. Learn via audio or video, receive the supporting materials, and fulfill MCLE requirements at your convenience with the best content available!
These courses are CLE accredited in Texas and California, with some accredited in Oklahoma.
If you need credit for an eCourse in other states please read through the disclaimerbefore purchasing an eCourse to make sure you will be able to self-report your MCLE credit after completion of the eCourse
Session 1: Greed...for Lack of a Better Word...is[n't] Good - Using a series of case studies, explore the ethical obligations and fiduciary duties owed by lawyers to clients and how the Texas Disciplinary Rules of Professional Conduct, the Federal Rules of Civil Procedure, and the Texas Rules of Civil Procedure are implicated in each.
Session 2: Everyday Strategies for Avoiding Professional Misconduct - Explore easy, common sense techniques that you can employ in your law practice to steer clear of legal malpractice, breaches of fiduciary duty, and findings of professional misconduct. A timely and important ethics tune-up that you won’t want to miss.
Session 3: Mediation Maximus: Do's and Don'ts for a Positive Mediated Outcome - Do’s and don’ts to maximize the potential for a positive mediated outcome and avoid wasting time and money.
Session 4: Border Searches of Cell Phones and Computers - As unsettling as they are, digital border searches are legal. Delete your client files from your devices if you want to avoid delays occasioned by a search.
Session 5: Should You Take that Non-Hourly Case? - Effective case analysis is crucial to coming out ahead on contingency and fixed fee cases. Learn what you need to think about to create a sustainable alternative fee practice.
Session 6: Effective, Efficient, and Economically Appropriate Litigation - Lawyers should communicate early and often with their clients about case planning, proportionate discovery, strategy, and litigation objectives, and should negotiate appropriate dispute resolution agreements with opposing counsel. more »
Session 1: Insurance Litigation Post-Harvey - Review the most hotly contested issues in first party insurance claims and litigation arising out of the recent hurricane, including flood versus wind, special rules for TWIA claims, and the new "natural causes" amendments to the Texas Insurance Code.
Session 2: UCC Security Interests in Real Estate Financings - Address the creation and perfection of UCC security interests in real estate financing transactions.
Session 3: Cybersecurity Insurance - Examine key insurance provisions and hear thoughts on evolving exposures impacting privacy and cyber insurance. more »
An examination of ransomware, business email compromises, insider threats, and other prominent cybersecurity threat vectors and vulnerabilities, as well as best practices and recommendations from a government enforcement perspective for addressing threats and minimizing liability. more »
Session 1: Regulatory and Ethical Considerations for Handling Sensitive Electronic Information - Explore the regulatory framework when handling sensitive electronic information. Also, understand the ethical considerations when handling the information and if a breach occurs.
Session 2: Data: Liability or Asset? - Explore the opportunities and challenges of managing data in Texas, and review recent developments regarding data sharing, open data, and data security and privacy. more »
Session 1: GDPR is Effective Today! - May 25, 2018 is the effective date for the European Union’s General Data Protection Regulation, the world’s most comprehensive privacy law. On this day for which so many have prepared, we will share in-house and outside counsel perspectives on what the GDPR means for international companies that do business in the EU, which aspects of compliance efforts have been most challenging, and what lies ahead in maintaining GDPR “accountability” and in connection with the forthcoming, related ePrivacy Regulation.
Session 2: Do You Know Where Your Data is?: Data Sharing and the State of the Law - Modern companies are awash in data. Employees generate it and are usually looking for the most efficient way to share it internally and externally. Review the myriad of problems that can occur even with the most well-meaning of employees. From the possible export control risks of emailing technical information to an overseas colleague, to using Dropbox and other file sharing sites to exchange information, to providing data to contract employees, and more, explore the state of the law as it relates to data and what can happen if you lose control of it.
Session 3: Data Breaches, Big Data, and FTC Oversight - Learn how and why the FTC polices data breaches and the collection and exploitation of big data.
Session 4: Protecting Client Information-Cyber Protection Duties as an Attorney - Explore the ethical and legal obligations of attorneys and law firms to protect client data and communications from the latest cybersecurity threats.
Session 5: Ethics and Professionalism in a Global Environment - Ethics and professionalism are being influenced by many factors in today’s global environment. Consider some of these factors, along with areas of commonality amongst the legal ethics rules from a sampling of jurisdictions.
Session 6: Law Firm Data Security and the Ethical Duty of Technology Competence - As clients demand attorneys deliver legal services more efficiently by using technology it increases pressure to have technical knowledge and proficiency. Further, the American Bar Association and 28 states have created a model rule for the ethical duty of technology competence. Hear an overview of the significant material risks and impact on a law firm following a breach and the potential consequences from an ethics and disciplinary perspective. more »
Review recent developments in U.S. data breach and cyber class action litigation, as well as in new and emerging enforcement standards at the federal and state level, including the SEC Guidance On Cybersecurity Disclosures. more »
From corporate executives to contract employees, the use of ephemeral data and messaging applications to discuss company business increases daily. Hear an overview of what you need to know about this emerging technology—including how disappearing data works, options for preserving it (when necessary), how to implement and configure ephemeral applications for corporate use, and the benefits and risks associated with the technology (including the implications for document retention, document preservation, and discovery obligations). more »
The EU passed the General Data Protection Regulation (GDPR) in 2016 and, after a two-year grace period, the GDPR entered into force on May 25, 2018. Hear insights on the areas where companies continue to focus their time, resources, and concern following the GDPR’s entry into force. In addition, hear first-hand experience from an attorney who spent the first two months following the GDPR’s “go-live” date in Brussels, including meeting European privacy authorities, to provide updates on the first wave of GDPR enforcement. more »
Session 1: Internal Controls and Compliance - Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.
Session 2: Incident Response and Breach Disclosure - Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.
Session 3: Third-Party Vendor Risk Management - Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators. more »
Session 1: Advanced Licensing - With more and more companies monetizing their intellectual property through licensing arrangements and other forms of technology transactions, courts continue to develop licensing law and contract principles at an ever-increasing pace. Review important key agreement clauses in light of recent developments, with an emphasis on practical drafting and negotiating strategies.
Session 2: Open Source and Community License Enforcement - Enforcement of open source licenses via copyright infringement actions, in the US and abroad, is common. Learn about community efforts to reign in copyright trolls and gain a better understanding of current trolling activity. more »
Session 1: Special Considerations for the Business Data Breach - Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and your brand. Explore developments in incident response and hear practical guidance for managing and insuring against risk while satisfying legal obligations when the inevitable breach occurs.
Session 2: Cybersecurity: In-House Counsel Challenges and Perspectives - A conversation with in-house counsel discussing salient and trending topics in cybersecurity, including balancing employee privacy and effective cyber defense, finding the “right” level of supplier cybersecurity diligence, and recommended practices for implementing data security governance. more »
Cybersecurity intersects substantially with national security giving rise to complex questions of policy and law. Hear Professor Chesney map the terrain and review important recent developments. more »
With cybercrimes dominating the news, how can you avoid making yourself an attractive or easy target? Hear from a former NSA intelligence officer with over 20 years of experience in information security and learn how to understand the mind of a hacker. more »